Understanding tshark, sipgrep and Asterisk logger capabilities

Hello,

I’ve got a rather complex setup involving an Asterisk 22.0 on a Debian Bookworm host. On this host, I’ve installed an OpenVPN server.

I’ve got a couple of Yealink phones over the Internet. These embed an OpenVPN client. My ultimate goal to is have all these phones communicating with Asterisk though this OpenVPN server so that I won’t have to configure IP phone public IPs.

When configuring this, I’m using tshark, sipgrep or Asterisk’s logger to observe what’s going on. I would appreciate help on to understand what I shall expect from those 3 tools.

  1. With `shark -i tun0`, I can see inbound SIP traffic coming in from a remote IP phone.
  2. With `sipgrep -i tun0`, I can’t see any traffic coming in.
  3. With `pjsip set logger host 10.5.0.0/24`, I can’t see any traffic coming in.

Given 1 and 2 above, would you say that my firewall is dropping incoming SIP for some reason, or that some arguments are missing in sipgrep command (or both) ?

Am I correct to expect any incoming SIP, allowed by my firewall, to be displayed by Asterisk logger even if this traffic doesn’t match any PJSIP endpoint ?

Best regards

Typo read `tshark -i tun0` (was `shark -i tun0`)

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.